v0.12.1
Our mission
Software Heritage ambition is to collect, preserve, and share software:
- we do not make distinctions and collect all software that is publicly available in source code form
- we preserve software because it is fragile and we are unfortunately starting to lose it
- we are building the largest archive of software source code ever assembled and making it accessible to everybody
Applicable law
Software Heritage Archive is under the responsibility of Inria, France's National Institute for Research in Digital Science and Technology. Accordingly, French law is applicable.
Takedown notices
The Software Heritage archive collects publicly available source code, and its development history, from a variety of sources.
Software Heritage does not perform any screening of the collected source code and development history, hence illicit content present therein may become part of the Software Heritage archive. In accordance with applicable French law, Software Heritage and Inria shall not be held liable for copyright infringement, provided they offer legitimate rights holders a viable process to request the removal of infringing content.
Read more about takedown notices
Personal data and name changes
People change their names and/or email addresses for many reasons. In cases covered in the GPDR information notice established by Inria:
- If the main location for the source code has been updated, we can archive the updated code and remove what was previously archived. Access to copies of the same files from other source code location can be permanently restricted.
- When the main source code location cannot be updated we can hide all or part of the archived content and make name replacements on the fly.
Rest assured that we want to preserve the dignity and safety of anyone who changes their name.
Any processing of personal data will be carried out in compliance with the obligations related to the application of the GDPR only by accredited persons to do so on the appropriate channels.
Unauthorized changes
Unfortunately, malicious actors may try to exploit our archive alteration tools to manipulate historical records and remove legitimate content from the archive. For example:
- Request to remove an open-source version of the software after changing its license to a closed one.
- Request to delete or modify code written by others without proper authorization.
To mitigate these risks, we have implemented a rigorous process for reviewing and approving all requests for archive changes. This includes verifying the original licensing of the source code, confirming its online availability, and may involve reviewing personal information provided by the requester.
We must therefore apply a strict process to handle requests for changes to the archive, by verifying the licenses used to publish the source code, the online availability of the repository and sometimes personal information of the requester to ensure that the request is indeed valid.